Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Firefighting to Future-Proof: Why IT Needs an Organizing Principle

IT and security leadership faces daily pressures to respond swiftly to emerging challenges. This often leads to tactical, short-term decisions aimed at extinguishing immediate fires. Although these responses may address urgent concerns temporarily, they rarely provide lasting value or strategic clarity.

Securing the Future: How to Safeguard MCP and Agentic AI with Teleport and AWS

As enterprises rapidly adopt agentic AI and large language models (LLMs) to automate critical business processes and access sensitive data, the traditional security playbook is no longer sufficient. The Model Context Protocol (MCP), a new connector for AI systems like Amazon Bedrock Agents, is revolutionizing enterprise integration—but it also introduces new risks. Join us for an in-depth session exploring how to secure MCP-based AI architectures using Teleport’s Infrastructure Identity Platform and AWS. We’ll cover.

What You Need to Know about the PayPal Data Breach

PayPal was established in 1998 by Peter Thiel, Luke Nosek, and Max Levchin. The application's goal was cybersecurity for handheld devices before pivoting to a digital wallet. It merged with X.com in 2000 and was later rebranded for online payment systems. After spinning off from eBay in 2015, the platform expanded globally to democratize financial services to ensure everyone can access convenient products.

Beyond the Hype: What True API Security Leadership Looks Like

In our previous post, we highlighted a key insight from the 2025 KuppingerCole Leadership Compass: securing AI depends on securing APIs first. The report emphasizes that as AI use grows, the attack surface for APIs becomes more complex and risky. With many solutions available, navigating vendor claims can be challenging, making independent expert analysis extremely valuable.

The Business of Malware: Inside the MaaS Economy

In our 2025 State of the Underground report, we found that 384 unique varieties of malware were sold across the top three criminal forums in 2024, a 10% increase from 349 in 2023, signifying an expansion in the underground malware marketplace. These figures reflect malware explicitly offered for sale (not shared freely), and each distinct version or naming variation is counted independently.

68% of cyberattacks start with stolen credentials

More than 16 billion passwords, cookies and tokens were recently exposed in one of the largest data breaches in history. The scale of the theft, with data from services including Google, Apple, Facebook, Amazon and Microsoft, makes one conclusion clear: credentials are the first step in compromising critical data.

Malicious Screen Connect Campaign Abuses AI-Themed Lures for Xworm Delivery

During a recent Advanced Continual Threat Hunt (ACTH) investigation, the Trustwave SpiderLabs Threat Hunt team identified a deceptive campaign that abused fake AI-themed content to lure users into executing a malicious, pre-configured ScreenConnect installer.

8 Malicious npm Packages Deliver Multi-Layered Chrome Browser Information Stealer

Open-source software repositories have become one of the main entry points for attackers as part of supply chain attacks, with growing waves using typosquatting and masquerading, pretending to be legitimate. The JFrog Security Research team regularly monitors open-source software repositories using advanced automated tools, in order to detect malicious packages.